The IT Law Wiki

Definition[]

Cryptologic activities

include signals intelligence activities, covered under intelligence activities, and the solutions, products, and services to ensure the availability, integrity, authentication, confidentiality, and non-repudiation of national security telecommunications and information systems.[1]

References[]